Publications
2005. Collective-movement teams for cooperative problem solving. Integrated Computer-Aided Engineering. 12(3):217-235.
2005. Collusion resistance analysis of multimedia fingerprinting systems. IEEE Tran. on Image Processing.
2005. Colour‐coded pixel‐based highly interactive Web mapping for georeferenced data exploration. International Journal of Geographical Information Science. 19(4):413-428.
2005. Combining self-reported and automatic data to improve programming effort measurement. Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering. :356-365.
2005. Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A.. SIGACT News. 36(2):14-19.
2005. Comparing the Performance of High-Level Middleware Systems in Shared and Distributed Memory Parallel Environments. Parallel and Distributed Processing Symposium, 2005. Proceedings. 19th IEEE International. :30-30.
2005. Comparison of the Efficiency of Translation Operators Used in the Fast Multipole Method for the 3D Laplace Equation. Technical Reports from UMIACS UMIACS-TR–2005-09.
2005. A Comparison of Voice Controlled and Mouse Controlled Web Browsing (2000). Institute for Systems Research Technical Reports.
2005. Computation of scattering from clusters of spheres using the fast multipole method. The Journal of the Acoustical Society of America. 117(4):1744-1761.
2005. Computation of scattering from clusters of spheres using the fast multipole method. The Journal of the Acoustical Society of America. 117:1744-1744.
2005. Computer vision on FPGAs: Design methodology and its application to gesture recognition. Computer Vision and Pattern Recognition-Workshops, 2005. CVPR Workshops. IEEE Computer Society Conference on. :133-133.
2005. Constrained spectral clustering under a local proximity structure assumption. In Proceedings of the 18th International Conference of the Florida Artificial Intelligence Research Society (FLAIRS-05).
2005. Constructing task visibility intervals for a surveillance system. Proceedings of the third ACM international workshop on Video surveillance & sensor networks. :141-148.
2005. On constructing universal one-way hash functions from arbitrary one-way functions. Journal of Cryptology.
2005. Content Index to Volume 18. INTERNATIONAL JOURNAL OF HUMAN–COMPUTER INTERACTION. 18(3):367-368.
2005. Coordinated sensor deployment for improving secure communications and sensing coverage. Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. :117-128.
2005. Coordinating Overviews and Detail Views of WWW Log Data (2000). Institute for Systems Research Technical Reports.
2005. Correctness properties for Internet routing. Allerton Conference on Communication, Control, and Computing.
2005. Critical Factors Influencing the Occurrence of Vibrio Cholerae in the Environment of Bangladesh. Applied and Environmental MicrobiologyAppl. Environ. Microbiol.. 71(8):4645-4654.